Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28807: n/a

0
Medium
VulnerabilityCVE-2024-28807cvecve-2024-28807
Published: Mon Sep 30 2024 (09/30/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Infinera hiT 7300 5.60.50. Cleartext storage of sensitive information in the memory of the @CT desktop management application allows guest OS administrators to obtain various users' passwords by accessing memory dumps of the desktop application.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 11:28:51 UTC

Technical Analysis

CVE-2024-28807 is a security vulnerability identified in the Infinera hiT 7300 version 5.60.50, specifically within the @CT desktop management application. The core issue is the cleartext storage of sensitive information, including various users' passwords, in the application's memory. This flaw falls under CWE-312, which concerns the improper protection of sensitive information. An attacker with guest OS administrator privileges can access memory dumps of the desktop application and extract these passwords, compromising user credentials. The vulnerability requires local access with high privileges (PR:H) and some user interaction (UI:R), limiting the attack vector to insiders or attackers who have already gained elevated local access. The CVSS v3.1 score is 6.5, reflecting a medium severity with high impact on confidentiality, integrity, and availability. The vulnerability could lead to unauthorized access to network devices managed by the Infinera hiT 7300 system, potentially allowing attackers to manipulate or disrupt network operations. No patches or exploits are currently reported, indicating that the vulnerability is newly disclosed and not yet actively exploited. The lack of patch availability necessitates immediate compensating controls to reduce risk.

Potential Impact

The vulnerability poses a significant risk to organizations using the Infinera hiT 7300 platform, particularly those in telecommunications and network infrastructure sectors. By extracting user passwords from memory, attackers with guest OS admin rights can escalate privileges or impersonate legitimate users, leading to unauthorized access to critical network management functions. This can result in data breaches, network outages, or manipulation of network traffic, impacting service availability and integrity. The compromise of user credentials may also facilitate lateral movement within the network, increasing the attack surface. Given the high confidentiality and integrity impact, organizations could face operational disruptions and reputational damage. The requirement for local high privileges and user interaction limits remote exploitation but does not eliminate insider threats or risks from compromised local accounts.

Mitigation Recommendations

Since no patches are currently available, organizations should implement strict access controls to limit guest OS administrator privileges on systems running the Infinera hiT 7300 management application. Employing the principle of least privilege and monitoring for unusual memory access or dumping activities can help detect exploitation attempts. Use memory protection mechanisms such as encryption or secure enclaves if supported by the OS or application environment. Regularly audit and restrict physical and remote access to management consoles. Consider isolating the management application environment from less trusted networks and users. When patches become available, prioritize timely application. Additionally, educate administrators about the risks of memory dumping and enforce strong authentication and session management to reduce the risk of credential compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d98b7ef31ef0b58923d

Added to database: 2/25/2026, 9:46:00 PM

Last enriched: 2/26/2026, 11:28:51 AM

Last updated: 4/12/2026, 3:34:17 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses